Skip to main content

An Effective Integrity Verification Scheme for Ensuring Data Integrity in Cloud Computing

  • Conference paper
  • First Online:
Innovations in Bio-Inspired Computing and Applications (IBICA 2021)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 419))

  • 813 Accesses

Abstract

Cloud computing is growing in quality thanks to its ability to supply dynamically ascendible resources provisioned as services no matter user or location device. However, moving knowledge to the cloud means the management of the info is a lot of within the hands of the cloud supplier instead of the info owner. Despite the advantages that the cloud presents, cloud computing technology is moon-faced with a range of legal and technological challenges. Security and privacy are amongst the most important challenges as known. There should be certain type of system to guarantee the integrity of the records. The current Cloud safety model is sited on the interpretation that the client should trust the source. Guaranteeing documents integrity needs a promise of trust among the customer and the supplier. Numerous cryptographic methods have been developed and used to deliver improved safety for the sake of keeping integrity issues. We assume that our file (F) is divided into n shares. Poly1305 could be a cryptographically message authentication code (MAC). It is often wont to verify the info integrity and therefore the legitimacy of a message. Shamir Secret Sharing is used to split client file into n shares and these shares are further encrypted using poly1305. An Effective Integrity Verification Scheme (EIVS) based SSS and Poly-1305 is implemented and compared with SSS-AES. Entropy and Timing analysis of EIVS is done for short, long and larger text files.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Parmar1, S.K., Dave, K.C.: A review on various most common symmetric encryptions algorithms. IJSRD – Int. J. Sci. Res. Dev. 1(4) (2013)

    Google Scholar 

  2. Rasheed, H.: Data and infrastructure security auditing in cloud computing environments. Int. J. Inf. Manage. 34(3), 364–368 (2014)

    Article  Google Scholar 

  3. Sirohi,P., Agarwal, A.: Cloud computing data storage security framework relating to data integrity, privacy and trust. In: 2015 1st International Conference on Next Generation Computing Technologies (NGCT), pp. 115–118. Dehradun (2015). https://doi.org/10.1109/NGCT.2015.7375094

  4. Marquez, L., Rosado, D.G., Mouratidis, H., Fernandez Medina, E.: Design activity in the process of migrating security features to cloud. In: IEEE Latin America Transactions, vol. 14, no. 6, pp. 2846–2852 (June 2016). https://doi.org/10.1109/TLA.2016.7555263

  5. Subha, T., Jayashri, S.: Efficient privacy preserving integrity checking model for cloud data storage security. In: 2016 Eighth International Conference on Advanced Computing (ICoAC), pp. 55–60. Chennai (2017). https://doi.org/10.1109/ICoAC.2017.7951745

  6. Binu, V.P., Sreekumar, A.: Simple and efficient secret sharing schemes for sharing data and image. Int. J. Comput. Sci. Inform. Technol. 6(1), 404–409 (2015)

    Google Scholar 

  7. Raipure, A.A., Alvi, A.S., Deshmukh, P.P.: An approach secret sharing algorithm in cloud computing security over single to multi cloud. Int. Res. J. Eng. Technol. (IRJET), 03(06) (June 2016)

    Google Scholar 

  8. Tieng, D.G., Nocon, E.: Some attacks on Shamir’s secret sharing scheme by inside adversaries. In: Presented at the DLSU Research Congress 2016 De La Salle University, Manila, Philippines, 7–9 March 2016

    Google Scholar 

  9. Farràs, O., Hansen, T.B., Kaced, T., Padró, C.: On the information ratio of non-perfect secret sharing schemes. Algorithmica 79(4), 987–1013 (2016). https://doi.org/10.1007/s00453-016-0217-9

    Article  MathSciNet  MATH  Google Scholar 

  10. Calkavur, S., Molla, F.: An image secret sharing method based on Shamir secret sharing. Curr. Trends Comput. Sci. Appl. App 1(2). CTCSA (2018)

    Google Scholar 

  11. Molla, F., Calkavur, S.: A new approach to construct secret sharing schemes based on field extensions. Eur. J. Pure Appl. Math. 11(2), 468–475 (2018)

    Article  MathSciNet  Google Scholar 

  12. Iwamoto, M., Yamamoto, H., Ogawa, H.: Optimal Multiple Assignments Based on Integer Programming in Secret Sharing Schemes with General Access Structures. [cs.CR]. IEEE (2018) arXiv:cs/0506064v1

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kamboj, M., Rana, S. (2022). An Effective Integrity Verification Scheme for Ensuring Data Integrity in Cloud Computing. In: Abraham, A., et al. Innovations in Bio-Inspired Computing and Applications. IBICA 2021. Lecture Notes in Networks and Systems, vol 419. Springer, Cham. https://doi.org/10.1007/978-3-030-96299-9_5

Download citation

Publish with us

Policies and ethics